In this video walkthrough, we covered Data Exfiltration through HTTP post requests, HTTPS and HTTP tunneling.
**********
Receive Cyber Security Field Notes and Special Training Videos
/ @motasemhamdan
*******
Instagram
/ dev.stuxnet
Twitter
/ manmotasem
Facebook
/ motasemhamdantty
LinkedIn
[1]: / motasemhamdan7673289b
[2]: / motasemeldadhabb42481b2
Website
https://www.motasemnotes.net
Patreon
https://www.patreon.com/motasemhamdan...
Backup channel
/ @hacknotesbackup
My Movie channel:
/ @motasemhamdanhacknotes
******